Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Traffic Analysis Quiz: SANS ISC InfoSec Forums

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Traffic Analysis Quiz:


It's that time of the month again...  Time for another traffic analysis quiz!  This one is from a Windows 10 client logged into an Active Directory (AD) environment.  Details follow:

  • LAN segment: ( through
  • Domain Controller:  Ugly-Wolf-DC at
  • Gateway:
  • Broadcast address:

The pcap and alerts are available on my Github repository at:

The zip archives are password-protected with the term: infected

The alerts archive contains an image of alerts and a text file with the same information.

Shown above:  Alerts image for this quiz, with the alerts blurred (you'll have to download the alerts file to see them).

The alerts file was created using Security Onion running Suricata using the EmergingThreats Pro ruleset, and the alerts were viewed using Sguil.

The alerts should give away the type of infection(s) happening on the Windows computer at  Since this is an AD environment, you should also be able to find the user account name that was logged into the Windows host before it became infected.  In a real-world situation, this could help you track down an infected user and perform incident response actions.

You can also use this quiz to practice drafting an incident report.

If the answers are not obvious, feel free to leave a comment in the comments section, and I'll answer when I get the time.

Brad Duncan
brad [at]


377 Posts
ISC Handler
Oct 16th 2020
Is the actual file removed? I can see the file name being downloaded but when I look at the HTTP object list it isn't there. I tried a different pcap and can see files in it so I feel it should work, or I'm missing something. I got the PC name, OS version, browser, user, and website right away. Good practice! Thanks for this!

Sign Up for Free or Log In to start participating in the conversation!